Mozilla, Tor, IE, Opera, etc.,), the cipher suite that was offered (RC4, DES, 3DES, AES, etc.).


The attached document is an interesting deep dive into threat modeling the potential of encrypted network traffic to be malicious based on it is meta data and use of TLS.  Factors, like the client that was used (Mozilla, Tor, IE, Opera, etc.,), the cipher suite that was offered (RC4, DES, 3DES, AES, etc.). 
What are your thoughts on the approach outlined in the article?  Do you see any chance for false positives?

Comments

Popular posts from this blog

Create Thread”. Do not create a new forum.

Discuss the notion that firms should stop doing business with customers who constantly generate losses versus the notion that the customer is always right.

Access AHIMA: What is Health Information